This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies.You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

An error has occurred.

Buy a Phishing campaign for educational purposes based on your requirements. The service is based on one of the existing LUCY attack templates.

We will set up and prepare a Educational Phishing Campaign based on your requirements and based on one of our existing attack templates. Templating: Depending on your needs we will configure a Phishing, SMiShing, filebased or a “Bad Media” (USB/DVD/CD) Attack. The configuration of LUCY Server including server configuration tasks is part of theis fix price service as well. Campaign Execution: We will execute the campaign for you or you can start it yourself. Debriefing: After successful completion we’ll support you in interpreting the campaign results . This service is provided only to owners of a LUCY commercial edition. Service Features:

Requirements engineering with customer

Configuration of the Campaign

Domain reservation and configuration (if needed)

User Management and Import (if needed)

Templating: Setting up an appropriate Attack Scenario based on a existing LUCY Template

We make people testing, employee awareness and technology assessments affordable to everyone!

We have been white hackers and IT security experts for 20 years. During this time, we carried out hundreds of penetration tests, and we were successful every time the predefined test scenarios aimed at people AND systems at the same time. The combination of social engineering (such as a phishing attack) with malware tools has ALWAYS led to at least one successful penetration. And one is enough.

If you want to successfully defend against such attacks, you have to protect the people and the systems together and you have to develop both together as if it were a unit. The todays separated market - system security on the one hand, security training and awareness for employees on the other - is bad. The current focus of the industry on the reduction of the penetration rate is also not correct, because - as already mentioned – One is all it takes. If you want your staff to evolve effectively to become aware of and vigilant against cyber threats, you need to drill them. This means you need to continually test and educate them. But utilizing such measures also needs to be affordable in terms of the amounts of money and effort they require. If they are neither financially feasible nor practically effortless, you simply won’t use them.

With LUCY, we developed a unique tool that allows you to test your security and help it evolve against cyber threats on both the people side and the system side simultaneously. We gathered our collective IT-security knowledge and created templates and wizards that are effective and easy to use. With this approach, you can quickly carry out a variety of campaigns: Phishing simulations, awareness trainings, technology assessments, malware simulations or simulated ransomware attacks. And the user can alarm the security team with our Phishing Incident Button for MS Outlook. The result is significant: you can hack yourself, phish, train and alarm yourself!

LUCY has been available since the beginning of 2015 and already has over 3,500 active installations and hundreds of paying customers. A network of partners on four continents provide value added services around LUCY-Server.

LUCY is the answer if you want to improve your IT security, keep your attention to cyber threats, or if you want to test your IT protection. We find our solution is just right when you need